InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Operationalize Threat Intelligence

Presented by

Joshua Costa, Director, Product Marketing; Joseph Opacki, Senior Director, Threat Intelligence; Kyle Wilhoit, Director

About this talk

Today, security teams face an overwhelming barrage of complex and evolving threats. Defending against these threats starts with knowing them — this is where cyberthreat intelligence plays a role. However, with millions of indicators daily, security teams struggle to get the most value from their threat intel investments. Cyberthreat intelligence (CTI) programs can significantly improve an organization’s ability to effectively detect, prevent and respond to security threats as long as you follow best practices. However, several factors must be considered to implement a successful CTI program. Join the webinar and hear Unit 42™ experts discuss: The pros and cons of CTI programs. How to start operationalizing threat intelligence. How Unit 42 and XSOAR TIM* help maximize efficiency. Get answers to these questions and more from the experts on our Unit 42 Threat Intelligence team. *Threat Intel Management Speakers: Joshua Costa Director, Product Marketing, Unit 42 & Cortex Joseph Opacki Senior Director, Threat Intelligence, Unit 42 Kyle Wilhoit Director, Threat Research, Unit 42
Palo Alto Networks (JAPAC)

Palo Alto Networks (JAPAC)

17979 subscribers99 talks
Next-gen cybersecurity solutions for today’s challenges.
Palo Alto Networks is the world’s cybersecurity leader. Our next-gen security solutions, expert services, and industry-leading threat intelligence empower organizations across every sector to transform with confidence. Check out this channel for the latest updates and topics on cybersecurity.
Related topics